Kaspersky ID:
KLA11613
Detekováno:
11/09/2019
Aktualizováno:
01/28/2026

Popis

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Incorrect temporary files access configuration of Mozilla updater service can be exploited locally to bypass security restrictions;
  2. Use-after-free vulnerability in DocShell can be exploited remotely via specially designed website to cause denial of service;
  3. Use-after-free vulnerability in worker destruction can be exploited remotely via specially designed website to cause denial of service;
  4.  
  5. Stack corruption due to incorrect number of arguments in WebRTC code can be exploited remotely via specially designed website to cause denial of service;
  6. Race condition vulnerability in Resist Fingerprinting can be exploited remotely via specially designed website to cause denial of service;
  7. Out of bounds write vulnerability in NSS can be exploited remotely via specially designed website to cause denial of service;
  8. Buffer overflow vulnerability in plain Firefox text serializer can be exploited remotely via specially designed website to cause denial of service;

Oficiální doporučení

Vykořisťování

Public exploits exist for this vulnerability.

Související produkty

seznam CVE

  • CVE-2019-17012
    critical
  • CVE-2019-17010
    critical
  • CVE-2019-13722
    high
  • CVE-2019-17009
    critical
  • CVE-2019-17011
    critical
  • CVE-2019-17005
    critical
  • CVE-2019-17008
    critical
  • CVE-2019-11745
    critical

Zobrazit více

Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com

Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Zjistěte více
Kaspersky Premium
Zjistěte více
Do you want to save your changes?
Your message has been sent successfully.